Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    134s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/08/2024, 00:04

General

  • Target

    91362bc7eecb2f2db215e24c3216ab454ca001cb8198b8497ee51353ad8406f0.exe

  • Size

    103KB

  • MD5

    6e49b13755b14b7b2c74f40946241f82

  • SHA1

    4c1cfa715105c50e6bcf2976efec13609cba0d87

  • SHA256

    91362bc7eecb2f2db215e24c3216ab454ca001cb8198b8497ee51353ad8406f0

  • SHA512

    150bdc7a4c35cfa62e549cb9bd52c16217fe8f6b7025fb1f0738a54f45680edc6e5d8d7a608f5383446939e140abbc0b6879a99a78b0ef9fb94318c3e4934d09

  • SSDEEP

    1536:V7Zf/FAxTWoJJZENTBQTnTqQtIGHv1d4x2jwg8yZVUKo5R:fny1tEmTqQ1P1m48wWV5R

Malware Config

Signatures

  • Renames multiple (4833) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\91362bc7eecb2f2db215e24c3216ab454ca001cb8198b8497ee51353ad8406f0.exe
    "C:\Users\Admin\AppData\Local\Temp\91362bc7eecb2f2db215e24c3216ab454ca001cb8198b8497ee51353ad8406f0.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:3104
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=944,i,2904906934812054273,11716976550456127484,262144 --variations-seed-version --mojo-platform-channel-handle=4360 /prefetch:8
    1⤵
      PID:1940

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\$Recycle.Bin\S-1-5-21-2170637797-568393320-3232933035-1000\desktop.ini.tmp

      Filesize

      103KB

      MD5

      64cc790ad718ed22920cb82262513a94

      SHA1

      3aa4c4a451c874fcd03696c487dfceb311f987b3

      SHA256

      3b7f31623537a554952c5379873cd969fe474d0474c5ec9864fbcd4fc802bd6a

      SHA512

      c97b9af291ba1bdac55b40fdaca13399cff34699d512243d2761f26683f03d492987fbd12789f87a60c598a0c85ade740a4eee432fcec621fe0abeec0f401de9

    • C:\Program Files\7-Zip\7-zip.chm.tmp

      Filesize

      216KB

      MD5

      c2f95eea5703bf3b191c92f4749450c0

      SHA1

      f577f019db6019086d13f52967b39723d08ffff9

      SHA256

      c94956b6ddff9132e5ea220207f960d13d1d3c46da2922aa6d16cf46f9ebf14c

      SHA512

      a4e54774f18452593727f6e97027a474d5a041bced59d9ca55ab7bf5cf5e9aa4ead34f1e22166ff2be518da7660a093d2134ae75c9498195042f3a364bf37a10

    • memory/3104-0-0x0000000000400000-0x000000000040B000-memory.dmp

      Filesize

      44KB

    • memory/3104-1752-0x0000000000400000-0x000000000040B000-memory.dmp

      Filesize

      44KB